File name: udat_map2xcmp.html
Map data sources for all 2.x CMP beans settings
Use this page to map container-managed persistence (CMP)
2.x beans of an application to data sources that are available to
the application.
To view this administrative console page, click .
Each table row corresponds to a CMP bean within a specific EJB
module. A row shows the JNDI name of the data source mapping target
of the bean only if you bound them together during application assembly.
For every data source that is displayed, you see the corresponding
security configuration.
Set Multiple JNDI names
Specify the Java Naming
and Directory Interface (JNDI) name for multiple EJB modules. Select
one or more EJB modules from the table, and select a JNDI name from
this list to configure the EJB modules with that JNDI name.
Information |
Value |
Data type |
Drop-down list |
Set Authorization Type
Specify the authorization type for securing the data source.
Select one or more EJB modules from the table to set the authorization
type.
Select either Container or Application from the displayed
list. Container-managed authorization indicates that WebSphere® Application
Server performs signon to the data source. Application-managed authorization
indicates that the enterprise bean code performs signon.
Modify Resource Authentication Method
Specify the authorization type and the authentication method
for securing the data source. Select one or more EJB modules from
the table to modify the resource authentication method.
You can choose between the following authentication methods:
- None:
- Determine which data source configurations to designate with no
authentication method.
- Select the appropriate table rows.
- Select None from the list of authentication method options
that precede the table.
- Click Apply.
- Use default method (many-to-one mapping):
- Determine which data source configurations to designate with the WebSphere Application Server DefaultPrincipalMapping
login configuration. Apply this option to each data source individually
if you want to designate different authentication data aliases. See
the information center topic on J2EE Connector security for more information
on the default mapping configuration.
- Select the appropriate table rows.
- Select Use default method (many-to-one mapping) from
the list of authentication method options that precede the table.
- Select an authentication data entry or alias from the list.
- Click Apply.
- Use Kerberos authentication: Specifies
to use the Kerberos authentication method.
- Ensure that you have configured the Kerberos authentication mechanism
in the application server.
- Select the appropriate table row.
- Select Use Kerberos authentication from
the list of authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
- To edit the properties of the custom login configuration, click Mapping
Properties in the table cell.
The application server will attempt to verify that you are connecting
to the correct type of database when you select this option.
- Use trusted connections (one-to-one mapping):
- Determine which data source configurations to designate with a
custom Java Authentication and Authorization Service
(JAAS) login configuration. See the information center topic on J2EE
Connector security for more information on custom JAAS login configurations.
- Select the appropriate table row.
- Ensure that the database to which the modules will connect is
configured for trusted connections.
- Select Use trusted connections (one-to-one mapping) from
the list of authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
The application server will attempt to verify that you are connecting
to the correct type of database when you select this option.
- Custom login configuration:
- Determine which data source configurations to designate with a
custom Java Authentication and Authorization Service
(JAAS) login configuration. See the information center topic on J2EE
Connector security for more information on custom JAAS login configurations.
- Select the appropriate table row.
- Select Use custom login configuration from the list of
authentication method options that precede the table.
- Select an application login configuration from the list.
- Click Apply.
- To edit the properties of the custom login configuration, click Mapping
Properties in the table cell.
Select
Select the check boxes of the rows that you want to edit.
Bean
The name of an enterprise bean in the application.
Module
The name of the module that contains the enterprise bean.
URI
Specifies location of the module relative to the root of
the application EAR file.
Target resource JNDI name
Specifies the resource to which the CMP bean is bound.
Resource authorization
Specifies the current setting for the resource authorization
type.
Modify this setting with Set authorization type.
|
